Crimes cibernéticos: estelionato virtual
Autor(a) principal: | |
---|---|
Data de Publicação: | 2012 |
Idioma: | por |
Título da fonte: | Repositório Institucional da UCB |
Texto Completo: | https://repositorio.ucb.br:9443/jspui/handle/10869/2819 |
Resumo: | Direito |
id |
UCB-2_e214b28b63cc6520f15ddde0285a1504 |
---|---|
oai_identifier_str |
oai:200.214.135.189:10869/2819 |
network_acronym_str |
UCB-2 |
network_name_str |
Repositório Institucional da UCB |
spelling |
Feitoza, Luis Guilherme de Matos2014-03-21T20:46:09Z2016-10-10T03:38:37Z2017-01-25T18:37:39Z2014-03-21T20:46:09Z2016-10-10T03:38:37Z2017-01-25T18:37:39Z2012-11-05FEITOZA, Luis Guilherme de Matos. Crimes cibernéticos: estelionato virtual. 2012. 70 f. Monografia (Graduação) - Universidade Católica de Brasília, Brasília, 2012.https://repositorio.ucb.br:9443/jspui/handle/10869/2819DireitoO estudo do presente trabalho de conclusão de curso baseia-se na investigação do tipo penal do estelionato praticado na internet. Expõe um breve relato histórico sobre o surgimento da rede mundial de computadores no Brasil e no mundo e elucida algumas questões pertinentes. Ilustra como os usuários que navegam na grande rede podem se proteger de possíveis ataques e lesões causadas pelos delinquentes virtuais. Apresenta de forma direta e sucinta todos os assuntos relativos aos cibercrimes e a maneira com que os transgressores agem para fraudar suas vítimas. Versa sobre sua aplicação penal e os incontáveis prejuízos causados à sociedade. Traz a forma como ele é cometido e os meios jurídicos existentes para reprimir e punir esta conduta. Faz menção a outros delitos informáticos recorrentes na internet e aponta o posicionamento dos tribunais a respeito deles. Comenta a importância dos projetos de leis que tramitam no Congresso Nacional e demonstra a carência de leis penais para tipificar e penalizar os indivíduos que incidem nesta técnica criminosa.The study of the present course conclusion work based itself in the inquiry of larceny committed on the internet. It exposes a brief historical about the emergence of the world net of computers in Brazil and in the world and explains some relevant questions. It illustrates as the users that sail in the big net are able to protected itself for possible attacks and cheats caused by the virtual delinquents. It presents of succinct and straight form all the relative matters to the cyber crimes and the way with that the transgressors act for defraud its victims. It is about penal application and the countless damages caused to the society. It brings the form as it is made and the existing legal means for repress and punish this conduct. It does mention to others recurring processed cyber crimes in the internet and aims the positioning of the courts as to them. It comments the importance of the projects of laws that are processed in the National Congress and demonstrate the lack of penal laws for typify and penalize the individuals that incident in this technical criminal.Submitted by Juliana Pereira (juliana.pereira@ucb.br) on 2014-03-17T15:44:39Z No. of bitstreams: 2 license_rdf: 20168 bytes, checksum: 288037d582f66c131a3b54761360a7bc (MD5) Luis Guilherme de Matos Feitoza.pdf: 570746 bytes, checksum: de25aef111ba912f1b69eae9251d9e0f (MD5)Approved for entry into archive by Kelson Anthony de Menezes(kelson@ucb.br) on 2014-03-21T20:46:09Z (GMT) No. of bitstreams: 2 license_rdf: 20168 bytes, checksum: 288037d582f66c131a3b54761360a7bc (MD5) Luis Guilherme de Matos Feitoza.pdf: 570746 bytes, checksum: de25aef111ba912f1b69eae9251d9e0f (MD5)Made available in DSpace on 2014-03-21T20:46:09Z (GMT). No. of bitstreams: 2 license_rdf: 20168 bytes, checksum: 288037d582f66c131a3b54761360a7bc (MD5) Luis Guilherme de Matos Feitoza.pdf: 570746 bytes, checksum: de25aef111ba912f1b69eae9251d9e0f (MD5) Previous issue date: 2012-11-05Made available in DSpace on 2016-10-10T03:38:37Z (GMT). No. of bitstreams: 5 Luis Guilherme de Matos Feitoza.pdf: 570746 bytes, checksum: de25aef111ba912f1b69eae9251d9e0f (MD5) license_url: 46 bytes, checksum: 0d2fb706760bf56ddf1358a832652ccf (MD5) license_text: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) license_rdf: 20168 bytes, checksum: 288037d582f66c131a3b54761360a7bc (MD5) license.txt: 1877 bytes, checksum: 84662e9ff0de521fe5e714c111389722 (MD5) Previous issue date: 2012-11-05Made available in DSpace on 2017-01-25T18:37:39Z (GMT). No. of bitstreams: 6 Luis Guilherme de Matos Feitoza.pdf.txt: 156099 bytes, checksum: 745c157d4a04263d785cd183adcc4cda (MD5) Luis Guilherme de Matos Feitoza.pdf: 570746 bytes, checksum: de25aef111ba912f1b69eae9251d9e0f (MD5) license_url: 46 bytes, checksum: 0d2fb706760bf56ddf1358a832652ccf (MD5) license_text: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) license_rdf: 20168 bytes, checksum: 288037d582f66c131a3b54761360a7bc (MD5) license.txt: 1877 bytes, checksum: 84662e9ff0de521fe5e714c111389722 (MD5) Previous issue date: 2012-11-05TextoInternetDireito penalEstelionato VirtualDireitoPenal lawLarceny committedCrimes cibernéticos: estelionato virtualinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/bachelorThesisUniversidade Católica de Brasília, Brasilinfo:eu-repo/semantics/openAccessporreponame:Repositório Institucional da UCBinstname:Universidade Católica de Brasília (UCB)instacron:UCBTEXTLuis Guilherme de Matos Feitoza.pdf.txtExtracted texttext/plain156099https://200.214.135.178:9443/jspui/bitstream/10869/2819/1/Luis%20Guilherme%20de%20Matos%20Feitoza.pdf.txt745c157d4a04263d785cd183adcc4cdaMD51ORIGINALLuis Guilherme de Matos Feitoza.pdfMonografiaapplication/pdf570746https://200.214.135.178:9443/jspui/bitstream/10869/2819/2/Luis%20Guilherme%20de%20Matos%20Feitoza.pdfde25aef111ba912f1b69eae9251d9e0fMD52CC-LICENSElicense_urlapplication/octet-stream46https://200.214.135.178:9443/jspui/bitstream/10869/2819/3/license_url0d2fb706760bf56ddf1358a832652ccfMD53license_textapplication/octet-stream0https://200.214.135.178:9443/jspui/bitstream/10869/2819/4/license_textd41d8cd98f00b204e9800998ecf8427eMD54license_rdfapplication/octet-stream20168https://200.214.135.178:9443/jspui/bitstream/10869/2819/5/license_rdf288037d582f66c131a3b54761360a7bcMD55LICENSElicense.txttext/plain1877https://200.214.135.178:9443/jspui/bitstream/10869/2819/6/license.txt84662e9ff0de521fe5e714c111389722MD5610869/28192017-01-25 16:37:40.027TElDRU4/P0EgREUgRElTVFJJQlVJPz8/P08gTj8/Ty1FWENMVVNJVkEgCgpBbyBhc3NpbmFyIGUgZW50cmVnYXIgZXN0YSBsaWNlbj8/YSwgby9hIFNyLi9TcmEuIChhdXRvciBvdSBkZXRlbnRvciBkb3MgZGlyZWl0b3MgZGUgYXV0b3IpOgoKYSkgQ29uY2VkZSBhIFVuaXZlcnNpZGFkZSBDYXQ/P2xpY2EgZGUgQnJhcz8/bGlhIG8gZGlyZWl0byBuPz9vLWV4Y2x1c2l2byBkZSByZXByb2R1emlyLCBjb252ZXJ0ZXIKKGNvbW8gZGVmaW5pZG8gZW0gYmFpeG8pLGNvbXVuaWNhciBlL291IGRpc3RyaWJ1aXIgbyBkb2N1bWVudG8gZW50cmVndWUgKGluY2x1aW5kbyBvCnJlc3Vtby9hYnN0cmFjdCkgZW0gZm9ybWF0byBkaWdpdGFsIG91IGltcHJlc3NvIGUgZW0gcXVhbHF1ZXIgbWVpby4gCgpiKSBEZWNsYXJhIHF1ZSBvIGRvY3VtZW50byBlbnRyZWd1ZSA/PyBzZXUgdHJhYmFsaG8gb3JpZ2luYWwsIGUgcXVlIGRldD8/bSBvIGRpcmVpdG8gZGUgY29uY2VkZXIKb3MgZGlyZWl0b3MgY29udGlkb3MgbmVzdGEgbGljZW4/P2EuIERlY2xhcmEgVGFtYj8/bSBxdWUgYSBlbnRyZWdhIGRvIGRvY3VtZW50byBuPz9vIGluZnJpbmdlLAp0YW50byBxdWFudG8gbGhlID8/IHBvc3M/P3ZlbCBzYWJlciwgb3MgZGlyZWl0b3MgZGUgcXVhbHF1ZXIgb3V0cmEgcGVzc29hIG91IGVudGlkYWRlLgoKYykgU2UgbyBkb2N1bWVudG8gZW50cmVndWUgY29udD8/bSBtYXRlcmlhbCBkbyBxdWFsIG4/P28gZGV0Pz9tIG9zIGRpcmVpdG9zIGRlIGF1dG9yLApkZWNsYXJhIHF1ZSBvYnRldmUgYXV0b3JpemE/Pz8/byBkbyBkZXRlbnRvciBkb3MgZGlyZWl0b3MgZGUgYXV0b3IgcGFyYSBjb25jZWRlciBhIFVuaXZlcnNpZGFkZQpDYXQ/P2xpY2EgZGUgQnJhcz8/bGlhIG9zIGRpcmVpdG9zIHJlcXVlcmlkb3MgcG9yIGVzdGEgbGljZW4/P2EsIGUgcXVlIGVzc2UgbWF0ZXJpYWwgY3Vqb3MKZGlyZWl0b3Mgcz8/byBkZSB0ZXJjZWlyb3MgZXN0Pz8gY2xhcmFtZW50ZSBpZGVudGlmaWNhZG8gZSByZWNvbmhlY2lkbyBubyB0ZXh0byBvdSBjb250ZT8/ZG8KZG8gZG9jdW1lbnRvIGVudHJlZ3VlLiAKClNlIG8gZG9jdW1lbnRvIGVudHJlZ3VlID8/IGJhc2VhZG8gZW0gdHJhYmFsaG8gZmluYW5jaWFkbyBvdSBhcG9pYWRvIHBvciBvdXRyYSBpbnN0aXR1aT8/Pz9vCnF1ZSBuPz9vIGEgVW5pdmVyc2lkYWRlIENhdD8/bGljYSBkZSBCcmFzPz9saWEsIGRlY2xhcmEgcXVlIGN1bXByaXUgcXVhaXNxdWVyIG9icmlnYT8/Pz9lcwpleGlnaWRhcyBwZWxvIHJlc3BlY3Rpdm8gY29udHJhdG8gb3UgYWNvcmRvLiAKCkEgVW5pdmVyc2lkYWRlIENhdD8/bGljYSBkZSBCcmFzPz9saWEgcG9kZSBpZGVudGlmaWNhciBjbGFyYW1lbnRlIG8ocykgc2V1ICh2b3Nzbykgbm9tZShzKQpjb21vIG8ocykgYXV0b3IoZXMpIG91IGRldGVudG9yKGVzKWRvcyBkaXJlaXRvcyBkbyBkb2N1bWVudG8gZW50cmVndWUsIGUgbj8/byBmYXplciBxdWFscXVlcgphbHRlcmE/Pz8/bywgcGFyYSBhbGd1Pz9tIGRhcyBwZXJtaXRpZGFzIHBvciBlc3RhIGxpY2VuPz9hID8/IG5lY2Vzcz8/cmlvIHF1ZSBjb25jb3JkZSBjb20gYQpsaWNlbj8/YSBkZSBkaXN0cmlidWk/Pz8/byBuPz9vLWV4Y2x1c2l2YSwgYW50ZXMgZG8gc2V1IGRvY3VtZW50byBwb2RlciBhcGFyZWNlciBuYSBSZXBvc2l0Pz9yaW8KZGEgVW5pdmVyc2lkYWRlIENhdD8/bGljYSBkZSBCcmFzPz9saWEuIFBvciBmYXZvciwgbGVpYSBhIGxpY2VuPz9hIGF0ZW50YW1lbnRlLiBDYXNvIHByZXRlbmRhCmFsZ3VtIGVzY2xhcmVjaW1lbnRvIGVudHJlIGVtIGNvbnRhdG8gcG9yIGNvcnJlaW8gZWxldHI/P25pY28ga2Vsc29uQHVjYi5iciBvdSB0ZWxlZm9uZQogLSAoMHh4NjEpIDMzNTYtOTMxNy85MDI5Lgo=Repositório de Publicaçõeshttps://repositorio.ucb.br:9443/jspui/ |
dc.title.pt_BR.fl_str_mv |
Crimes cibernéticos: estelionato virtual |
title |
Crimes cibernéticos: estelionato virtual |
spellingShingle |
Crimes cibernéticos: estelionato virtual Feitoza, Luis Guilherme de Matos Internet Direito penal Estelionato Virtual Direito Penal law Larceny committed |
title_short |
Crimes cibernéticos: estelionato virtual |
title_full |
Crimes cibernéticos: estelionato virtual |
title_fullStr |
Crimes cibernéticos: estelionato virtual |
title_full_unstemmed |
Crimes cibernéticos: estelionato virtual |
title_sort |
Crimes cibernéticos: estelionato virtual |
author |
Feitoza, Luis Guilherme de Matos |
author_facet |
Feitoza, Luis Guilherme de Matos |
author_role |
author |
dc.contributor.author.fl_str_mv |
Feitoza, Luis Guilherme de Matos |
dc.subject.por.fl_str_mv |
Internet Direito penal Estelionato Virtual Direito Penal law Larceny committed |
topic |
Internet Direito penal Estelionato Virtual Direito Penal law Larceny committed |
dc.description.pt_BR.fl_txt_mv |
Direito |
dc.description.abstract.por.fl_txt_mv |
O estudo do presente trabalho de conclusão de curso baseia-se na investigação do tipo penal do estelionato praticado na internet. Expõe um breve relato histórico sobre o surgimento da rede mundial de computadores no Brasil e no mundo e elucida algumas questões pertinentes. Ilustra como os usuários que navegam na grande rede podem se proteger de possíveis ataques e lesões causadas pelos delinquentes virtuais. Apresenta de forma direta e sucinta todos os assuntos relativos aos cibercrimes e a maneira com que os transgressores agem para fraudar suas vítimas. Versa sobre sua aplicação penal e os incontáveis prejuízos causados à sociedade. Traz a forma como ele é cometido e os meios jurídicos existentes para reprimir e punir esta conduta. Faz menção a outros delitos informáticos recorrentes na internet e aponta o posicionamento dos tribunais a respeito deles. Comenta a importância dos projetos de leis que tramitam no Congresso Nacional e demonstra a carência de leis penais para tipificar e penalizar os indivíduos que incidem nesta técnica criminosa. The study of the present course conclusion work based itself in the inquiry of larceny committed on the internet. It exposes a brief historical about the emergence of the world net of computers in Brazil and in the world and explains some relevant questions. It illustrates as the users that sail in the big net are able to protected itself for possible attacks and cheats caused by the virtual delinquents. It presents of succinct and straight form all the relative matters to the cyber crimes and the way with that the transgressors act for defraud its victims. It is about penal application and the countless damages caused to the society. It brings the form as it is made and the existing legal means for repress and punish this conduct. It does mention to others recurring processed cyber crimes in the internet and aims the positioning of the courts as to them. It comments the importance of the projects of laws that are processed in the National Congress and demonstrate the lack of penal laws for typify and penalize the individuals that incident in this technical criminal. |
description |
Direito |
publishDate |
2012 |
dc.date.issued.fl_str_mv |
2012-11-05 |
dc.date.accessioned.fl_str_mv |
2014-03-21T20:46:09Z 2016-10-10T03:38:37Z 2017-01-25T18:37:39Z |
dc.date.available.fl_str_mv |
2014-03-21T20:46:09Z 2016-10-10T03:38:37Z 2017-01-25T18:37:39Z |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/bachelorThesis |
status_str |
publishedVersion |
dc.identifier.citation.fl_str_mv |
FEITOZA, Luis Guilherme de Matos. Crimes cibernéticos: estelionato virtual. 2012. 70 f. Monografia (Graduação) - Universidade Católica de Brasília, Brasília, 2012. |
dc.identifier.uri.fl_str_mv |
https://repositorio.ucb.br:9443/jspui/handle/10869/2819 |
identifier_str_mv |
FEITOZA, Luis Guilherme de Matos. Crimes cibernéticos: estelionato virtual. 2012. 70 f. Monografia (Graduação) - Universidade Católica de Brasília, Brasília, 2012. |
url |
https://repositorio.ucb.br:9443/jspui/handle/10869/2819 |
dc.language.iso.fl_str_mv |
por |
language |
por |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
Texto |
dc.source.none.fl_str_mv |
reponame:Repositório Institucional da UCB instname:Universidade Católica de Brasília (UCB) instacron:UCB |
instname_str |
Universidade Católica de Brasília (UCB) |
instacron_str |
UCB |
institution |
UCB |
reponame_str |
Repositório Institucional da UCB |
collection |
Repositório Institucional da UCB |
bitstream.url.fl_str_mv |
https://200.214.135.178:9443/jspui/bitstream/10869/2819/1/Luis%20Guilherme%20de%20Matos%20Feitoza.pdf.txt https://200.214.135.178:9443/jspui/bitstream/10869/2819/2/Luis%20Guilherme%20de%20Matos%20Feitoza.pdf https://200.214.135.178:9443/jspui/bitstream/10869/2819/3/license_url https://200.214.135.178:9443/jspui/bitstream/10869/2819/4/license_text https://200.214.135.178:9443/jspui/bitstream/10869/2819/5/license_rdf https://200.214.135.178:9443/jspui/bitstream/10869/2819/6/license.txt |
bitstream.checksum.fl_str_mv |
745c157d4a04263d785cd183adcc4cda de25aef111ba912f1b69eae9251d9e0f 0d2fb706760bf56ddf1358a832652ccf d41d8cd98f00b204e9800998ecf8427e 288037d582f66c131a3b54761360a7bc 84662e9ff0de521fe5e714c111389722 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
|
repository.mail.fl_str_mv |
|
_version_ |
1724829846920495104 |